Abstract
Selling counterfeit online has become a serious problem, especially with the advancement of social media and mobile technology. Instead of investigating the products directly, one can only check the images, tags annotated by the sellers on the images, or the price to decide if a seller sells counterfeits. One of the ways to detect counterfeit sellers is to investigate their social graphs, in which counterfeit sellers show different behaviour in network measurements, such as those in centrality and EgoNet. However, social graphs are not easily accessible. They may be kept private by the operators, or there are no connections at all. This article proposes a framework to detect counterfeit sellers using their connection graphs discovered from their shared images. Based on 153 K shared images from Taobao, it is proven that counterfeit sellers have different network behaviours. It is observed that the network measurements follow Beta function well. Those distributions are formulated to detect counterfeit sellers by the proposed framework, which is 60% better than approaches using classification.
- [1] . 2010. Oddball: Spotting anomalies in weighted graphs. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 410–421.Google Scholar
- [2] . 2015. Graph based anomaly detection and description: A survey. Data Mining and Knowledge Discovery 29, 3 (2015), 626–688.Google Scholar
Digital Library
- [3] . 2007. k-means++: The advantages of careful seeding. In Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027–1035.Google Scholar
- [4] . 2011. Selecting quality twitter content for events. In Proceedings of the 5th International AAAI Conference on Web and Social Media.Google Scholar
- [5] . 2001. Eigenvector-like measures of centrality for asymmetric relations. Social Network 23, 3 (2001), 191–201.Google Scholar
Cross Ref
- [6] . 2014. Return of the devil in the details: Delving deep into convolutional nets. arXiv:1405.3531. Retrieved from https://arxiv.org/abs/1405.3531.Google Scholar
- [7] . 2013. Battling the internet water army: Detection of hidden paid posters. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE, 116–120.Google Scholar
- [8] . 2016. Wide & deep learning for recommender systems. In Proceedings of the 1st Workshop on Deep Learning for Recommender Systems. 7–10.Google Scholar
Digital Library
- [9] . 2017. An efficient computation framework for connection discovery using shared images. ACM Transactions on Multimedia Computing, Communications, and Applications 13, 4 (2017), 1–21.Google Scholar
Digital Library
- [10] . 2019. Detecting social signals in user-shared images for connection discovery using deep learning. IEEE Transactions on Multimedia 22, 2 (2019), 407–420.Google Scholar
Digital Library
- [11] . 2015. Connection discovery using big data of user-shared images in social media. IIEEE Transactions on Multimedia 17, 9 (2015), 1417–1428.Google Scholar
Digital Library
- [12] . 2018. Deep learning-based online counterfeit-seller detection. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE.Google Scholar
Cross Ref
- [13] . 2019. Detecting online counterfeit-goods seller using connection discovery. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 15, 2 (2019), 1–16.Google Scholar
Digital Library
- [14] . 2018. Characterizing user connections in social media through user-shared images. IIEEE Transactions on Big Data 4, 4 (2018), 447–458.Google Scholar
Cross Ref
- [15] . 2015. Ego-net community mining applied to friend suggestion. Proceedings VLDB Endowment 9, 4 (2015), 324–335.Google Scholar
Digital Library
- [16] . 2019. Graph neural networks for social recommendation. In Proceedings of the World Wide Web Conference. 417–426.Google Scholar
Digital Library
- [17] . 1978. Centrality in social networks conceptual clarification. Social Networks 1, 3 (1978), 215–239.Google Scholar
Cross Ref
- [18] . 2019. Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective. IEEE Transactions on Multimedia 21, 3 (2019), 566–578.Google Scholar
Cross Ref
- [19] . 2005. The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proceedings of the National Academy of Sciences 102, 22 (2005), 7794–7799.Google Scholar
Cross Ref
- [20] . 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770–778.Google Scholar
Cross Ref
- [21] . 2010. Identifying key users in online social networks: A pagerank based approach. In Proceedings of the International Conference on Information Systems.Google Scholar
- [22] . 2014. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM International Conference on Multimedia. ACM, 675–678.Google Scholar
Digital Library
- [23] . 2008. Centrality analysis methods for biological networks and their application to gene regulatory networks. Gene Regulation Systems Biology 2 (2008), GRSB–S702.Google Scholar
Cross Ref
- [24] . 2017. Mining fashion outfit composition using an end-to-end deep learning approach on set data. IEEE Transactions on Multimedia 19, 8 (2017), 1946–1955.Google Scholar
Digital Library
- [25] . 2010. Peoplerank: Social opportunistic forwarding. In Proceedings of the IEEE INFOCOM. IEEE, 1–5.Google Scholar
Digital Library
- [26] . 2012. Spotting fake reviewer groups in consumer reviews. In Proceedings of the 21st International Conference on World Wide Web. ACM, 191–200.Google Scholar
Digital Library
- [27] . 2013. What yelp fake review filter might be doing?. In Proceedings of the 7th International AAAI Conference on Weblogs and Social Media.Google Scholar
- [28] . 1999. The PageRank Citation Ranking: Bringing Order to the Web.
Technical Report . Stanford InfoLab.Google Scholar - [29] . 2013. Who will lead and who will follow: Identifying influential users in online social networks. Business & Information Systems Engineering 5, 3 (2013), 179–193.Google Scholar
Cross Ref
- [30] . 2018. SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on facebook. Applied Soft Computing 67, C (2018), 920–932.Google Scholar
Digital Library
- [31] . 2017. Social network security: Issues, challenges, threats, and solutions. Information Sciences 421 (2017), 43–69.Google Scholar
Cross Ref
- [32] . 2017. XSSClassifier: An efficient XSS attack detection approach based on machine learning classifier on SNSs.Journal of Information Processing Systems 13, 4 (2017), 1014–1028.Google Scholar
- [33] . 1979. Information Retrieval (2nd ed.). Butterworth-Heinemann, Newton, MA. Google Scholar
Digital Library
- [34] . 2014. Anomaly detection in online social networks. Social Networks 39 (2014), 62–70.Google Scholar
Cross Ref
- [35] . 2017. From densification power law to degree of separation: A case study. In Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 278–285.Google Scholar
Cross Ref
- [36] . 2016. Egonet tensor decomposition for community identification. In Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing. IEEE, 341–345.Google Scholar
Cross Ref
- [37] . 2012. Spammer behavior analysis and detection in user generated content on social networks. In Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems. IEEE, 305–314.Google Scholar
Digital Library
- [38] . 2010. Determining influential users in internet social networks. Journal of Marketing Research 47, 4 (2010), 643–658.Google Scholar
Cross Ref
- [39] . 2010. Don’t follow me: Spam detection in twitter. In Proceedings of the 2010 International Conference on Security and Cryptography. IEEE, 1–10.Google Scholar
- [40] . 2019. Neural graph collaborative filtering. In Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval. 165–174.Google Scholar
Digital Library
- [41] . 2019. Neural multimodal cooperative learning toward micro-video understanding. IEEE Transactions on Image Processing 29 (2019), 1–14.Google Scholar
Cross Ref
- [42] . 2021. Hierarchical user intent graph network for multimedia recommendation. IEEE Transactions on Multimedia (2021).Google Scholar
- [43] . 2019. Video anomaly detection and localization based on an adaptive intra-frame classification network. IEEE Transactions on Multimedia 22, 2 (2019), 394–406.Google Scholar
Digital Library
- [44] . 2009. Applying centrality measures to impact analysis: A coauthorship network analysis. Journal of the Association for Information Science and Technology 60, 10 (2009), 2107–2118.Google Scholar
Digital Library
- [45] . 2011. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Springer, 318–337.Google Scholar
Digital Library
- [46] . 2014. A unified framework of latent feature learning in social media. IEEE Transactions on Multimedia 16, 6 (2014), 1624–1635.Google Scholar
Cross Ref
- [47] . 2013. Duplicate detection for identifying social spam in microblogs. In Proceedings of the IEEE International Congress on Big Data. IEEE, 141–148.Google Scholar
Digital Library
- [48] . 2015. Detecting spammers on social networks. Neurocomputing 159 (2015), 27–34.Google Scholar
Digital Library
Index Terms
Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images
Recommendations
Detecting Online Counterfeit-goods Seller using Connection Discovery
With the advancement of social media and mobile technology, any smartphone user can easily become a seller on social media and e-commerce platforms, such as Instagram and Carousell in Hong Kong or Taobao in China. A seller shows images of their products ...
College students social media use and communication network heterogeneity
This study examined whether and how the usage of social media can influence college students' level of network heterogeneity and how network heterogeneity is associated with levels of bridging/bonding social capital and subjective well-being. In ...
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same information good? Pricing schemes affect buyers' usage levels and thus the ...






Comments